Identity Management Providers

Identity Management Providers

The identity management market has been around for a while. As a result, it comes as no surprise that there is a lot of competition in the market. There is an abundance of identity management providers (IdP), and many of them offer tremendous value to IT organizations. But, we shouldn’t just be examining the providers and the solutions. The growth of the cloud is revolutionizing the needs of an identity, and it brings up an important factor. We need to ask, “How is the IAM Market changing with the cloud?” This will shine a light on how identity management providers will fare in the near future, and set up consumers to make a better decision on a solution.

The first step in answering this question is to look at the journey of the identity management market.

Examining the Origins of Identity Management Providers

Origins of Identity Management ProvidersThe modern era of identity management kicked off with the advent of the authentication protocol LDAP (Lightweight Directory Access Protocol). This protocol was created back in the early 1990s by Tim Howes and his colleagues from the University of Michigan, and it has had a role in IT ever since. LDAP was the catalyst for two major components of the identity management market: OpenLDAP and Microsoft Active Directory®.

These two solutions grew to become some of the most recognized names in the identity management world. Active Directory quickly became the commercial leader, and OpenLDAP became the most popular open source option. These solutions offered excellent management capabilities over the on-prem environments of the late 90s and early 2000s, but as the environments began to evolve, the capabilities of these on-prem directories began to wane. For example, web applications started to become more popular in the enterprise which then necessitated web application single sign-on products. Mac® and Linux® systems also started to infiltrate the IT environment, requiring organizations to setup identity bridges. AWS cloud server infrastructure challenged Active Directory as well, and this required a more thoughtful approach to user management for IaaS providers. If all of that wasn’t enough, security requirements (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 88 posts and counting.See all posts by jon-griffin